Computer Forensics: Cybercriminals, Laws, and Evidence

被引:0
|
作者
Yu, Szde [1 ]
机构
[1] Wichita State Univ, Wichita, KS 67260 USA
关键词
D O I
10.1177/1057567713476708
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
引用
收藏
页码:103 / 104
页数:3
相关论文
共 50 条
  • [21] Tools and methods of computer forensics
    Strumenti e metodi della computer forensics
    Bassetti, Nanni, 1600, Associazione Italiana per l'Informatica e il Calcolo Automatico, Piazzale Rodolfo Morandi, 2, Milano, 20121, Italy (13):
  • [22] Computer forensics: Are you qualified?
    Comput. Fraud Secur., 2008, 12 (18-20):
  • [23] New perspectives on computer forensics
    Sinar, H
    FORENSIC SCIENCE INTERNATIONAL, 2003, 136 : 200 - 200
  • [24] Automated abduction for computer forensics
    Doncescu, Andrei
    Inoue, Katsumi
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 493 - 499
  • [25] eDiscovery versus Computer Forensics
    Matthews, David R.
    INFORMATION SECURITY JOURNAL, 2010, 19 (03): : 118 - 123
  • [26] Anti-computer forensics
    Hausknecht, K.
    Gruicic, S.
    2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2017, : 1233 - 1240
  • [27] Computer forensics chain of custody
    Enrique Arellano, Luis
    Mario Castaneda, Carlos
    CUADERNO ACTIVA, 2012, (03): : 67 - 81
  • [28] Computer Forensics: Principles and Practices
    Liu, Jigang
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2007, 2 (03) : 57 - 59
  • [29] Research and Review on Computer Forensics
    Guo Hong
    Jin Bo
    Huang Daoli
    CHINA COMMUNICATIONS, 2010, 7 (06) : 37 - 43
  • [30] Digital Evidence Protection Model with Batch-Verifying and Public Verifiability for Computer Forensics
    Qi, Zhao-Hui
    Gao, Zhan-Feng
    Shen, Ying-Ming
    Han, Bing-Xin
    INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 237 - 242